On Mon, Dec 11, 2000 at 03:11:40PM -0600, Bill Layer wrote:
>Starting nmap V. 2.53 by fyodor at insecure.org ( www.insecure.org/nmap/ )
>Interesting ports on localhost (127.0.0.1):
>(The 1505 ports scanned but not shown below are in state: closed)
>23/tcp     open        telnet
Bad admin! BAD! <Shakes finger>

>79/tcp     open        finger
don't need that one.

>113/tcp    open        auth
>143/tcp    open        imap2
>513/tcp    open        login
>514/tcp    open        shell
Don't need these either.

>Web, telnet, ftp, auth are all active on this machine, as I perceive no 
>threats on this LAN. Correct me if that is bad thinking.

See above.

>
>Thanks again, Ben.

No problem. You gonna be at the next tclug-beer-meeting?

-- 
Ben Lutgens		cell: 612.670.4789	http://www.sistina.com/
Sistina Software Inc.	work: 612.379.3951
Code Monkey Support (A.K.A. System Administrator)
Key fingerprint = A69A 118D 710B 8EB0 DC3B  D912 2F19 311A 02DD 1908

Make the force be with you. And for god's sake men, be careful.
        ** Lt.Col. Eaton 3rd Battalion 14th Infantry - Panama Jungle 1991
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 230 bytes
Desc: not available
Url : http://shadowknight.real-time.com/pipermail/tclug-list/attachments/20001211/dbabe5e3/attachment.pgp